#VU51886 Buffer overflow in Qualcomm Hardware solutions


Published: 2021-04-05

Vulnerability identifier: #VU51886

Vulnerability risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-11210

CWE-ID: CWE-119

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
AR8035
Mobile applications / Mobile firmware & hardware
PM4125
Mobile applications / Mobile firmware & hardware
PM4250
Mobile applications / Mobile firmware & hardware
PM6125
Mobile applications / Mobile firmware & hardware
PM6150A
Mobile applications / Mobile firmware & hardware
PM6150L
Mobile applications / Mobile firmware & hardware
PM6350
Mobile applications / Mobile firmware & hardware
PM7250B
Mobile applications / Mobile firmware & hardware
PM8008
Mobile applications / Mobile firmware & hardware
PMD9655
Mobile applications / Mobile firmware & hardware
PMI632
Mobile applications / Mobile firmware & hardware
PMK8003
Mobile applications / Mobile firmware & hardware
QAT3519
Mobile applications / Mobile firmware & hardware
QAT3522
Mobile applications / Mobile firmware & hardware
QAT3555
Mobile applications / Mobile firmware & hardware
QAT5515
Mobile applications / Mobile firmware & hardware
QAT5516
Mobile applications / Mobile firmware & hardware
QCA6390
Mobile applications / Mobile firmware & hardware
QCA9984
Mobile applications / Mobile firmware & hardware
QCM2290
Mobile applications / Mobile firmware & hardware
QCM4290
Mobile applications / Mobile firmware & hardware
QCS2290
Mobile applications / Mobile firmware & hardware
QCS4290
Mobile applications / Mobile firmware & hardware
QDM2301
Mobile applications / Mobile firmware & hardware
QDM2302
Mobile applications / Mobile firmware & hardware
QET4101
Mobile applications / Mobile firmware & hardware
QET6105
Mobile applications / Mobile firmware & hardware
QPA4360
Mobile applications / Mobile firmware & hardware
QPA4361
Mobile applications / Mobile firmware & hardware
QPA6560
Mobile applications / Mobile firmware & hardware
QPA8673
Mobile applications / Mobile firmware & hardware
QSW6310
Mobile applications / Mobile firmware & hardware
QSW8573
Mobile applications / Mobile firmware & hardware
QSW8574
Mobile applications / Mobile firmware & hardware
QTC410S
Mobile applications / Mobile firmware & hardware
QTM525
Mobile applications / Mobile firmware & hardware
SD460
Mobile applications / Mobile firmware & hardware
SD480
Mobile applications / Mobile firmware & hardware
SD662
Mobile applications / Mobile firmware & hardware
SDR425
Mobile applications / Mobile firmware & hardware
SDR660
Mobile applications / Mobile firmware & hardware
SDR735
Mobile applications / Mobile firmware & hardware
SDR735G
Mobile applications / Mobile firmware & hardware
SM4125
Mobile applications / Mobile firmware & hardware
SMB1351
Mobile applications / Mobile firmware & hardware
SMB1354
Mobile applications / Mobile firmware & hardware
SMB1355
Mobile applications / Mobile firmware & hardware
SMB1396
Mobile applications / Mobile firmware & hardware
SMR526
Mobile applications / Mobile firmware & hardware
WCD9370
Mobile applications / Mobile firmware & hardware
WCD9375
Mobile applications / Mobile firmware & hardware
WCD9385
Mobile applications / Mobile firmware & hardware
WCN3910
Mobile applications / Mobile firmware & hardware
WCN3950
Mobile applications / Mobile firmware & hardware
WCN3980
Mobile applications / Mobile firmware & hardware
WCN3988
Mobile applications / Mobile firmware & hardware
WCN3991
Mobile applications / Mobile firmware & hardware
WCN3998
Mobile applications / Mobile firmware & hardware
WCN3999
Mobile applications / Mobile firmware & hardware
WCN6850
Mobile applications / Mobile firmware & hardware
WGR7640
Mobile applications / Mobile firmware & hardware
WSA8810
Mobile applications / Mobile firmware & hardware
WSA8815
Mobile applications / Mobile firmware & hardware
WTR2965
Mobile applications / Mobile firmware & hardware
WTR3925
Mobile applications / Mobile firmware & hardware
QCS405
Hardware solutions / Firmware
SD665
Hardware solutions / Firmware

Vendor: Qualcomm

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in RPM region due to improper XPU configuration. A malicious application can trigger memory corruption and execute arbitrary code with elevated privileges.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

AR8035: All versions

PM4125: All versions

PM4250: All versions

PM6125: All versions

PM6150A: All versions

PM6150L: All versions

PM6350: All versions

PM7250B: All versions

PM8008: All versions

PMD9655: All versions

PMI632: All versions

PMK8003: All versions

QAT3519: All versions

QAT3522: All versions

QAT3555: All versions

QAT5515: All versions

QAT5516: All versions

QCA6390: All versions

QCA9984: All versions

QCM2290: All versions

QCM4290: All versions

QCS2290: All versions

QCS405: All versions

QCS4290: All versions

QDM2301: All versions

QDM2302: All versions

QET4101: All versions

QET6105: All versions

QPA4360: All versions

QPA4361: All versions

QPA6560: All versions

QPA8673: All versions

QSW6310: All versions

QSW8573: All versions

QSW8574: All versions

QTC410S: All versions

QTM525: All versions

SD460: All versions

SD480: All versions

SD662: All versions

SD665: All versions

SDR425: All versions

SDR660: All versions

SDR735: All versions

SDR735G: All versions

SM4125: All versions

SMB1351: All versions

SMB1354: All versions

SMB1355: All versions

SMB1396: All versions

SMR526: All versions

WCD9370: All versions

WCD9375: All versions

WCD9385: All versions

WCN3910: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN3991: All versions

WCN3998: All versions

WCN3999: All versions

WCN6850: All versions

WGR7640: All versions

WSA8810: All versions

WSA8815: All versions

WTR2965: All versions

WTR3925: All versions


External links
http://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability